tssci security

What is my favorite movie?!!

I asked a colleague once how to answer those silly questions, you know, the ones banks and other sites like to use to reset passwords? They're used to verify you are, who you say you "were." Well, my bank at the start of the year had introduced some security enhancements to their site and also required me to choose and answer five questions.

So today, I'm in a hurry and want to login to my bank account before I head off to class and before taking me to my account, it asks me "What is your favorite movie?" Ummm, okay.. What did I put? I completely forgot! My favorite movies change frequently, and I ended up going through Facebook and MySpace profiles to try and remember what my favorite movie could be (I have so many??), and no luck! After about trying fifteen different titles (are the answers case sensitive?), the page displays a notice that my online account has been disabled and call some number to unlock it.

What bullshit! And this happened to someone who's relatively "security aware" (in my opinion). I felt the frustration so many of our own users feel when they do not remember that stupid, ridiculously hard-to-remember password we make them change every 45 days. The problem is that my bank likes to randomly pick and choose when to ask you these questions. In my case, it was extremely frustrating.

Oh, and almost immediately after I got locked out of my account, one of my instructors had reminded of a quote from my favorite movie.. Want to know what it was?? Yeah, that's right...

Office Space.

Considerations for Export Control Compliance

Expanding on my previous blog post regarding export control and how it is defined, there are several other factors to take into consideration to help ensure compliance.

Thinking of Exporting Classified Material? Think Again

ITT was fined $100 million for illegally exporting classified technical data relating to night vision equipment overseas. In addition to being fined, they must "invest $50 million over five years to accelerate development of night vision technology, and the government will maintain rights to all technology that is developed under the agreement."

This incident should raise awareness to all companies who manufacture or develop export controlled commodities. In security, we need to ensure we comply with all EAR/ITAR/AECA regulations and prevent unauthorized exports to foreign nationals.

Q.) What is an export?

Q.) OK then, what is technical data?

Q.) What is a foreign national?

Q.) Who can I not export to?

If you have other questions, see your IP legal team or Business Area Export Representative for advice that pertains to your environment and what constitutes export controlled data for your business.

It takes a thief

I was watching an episode of It Takes a Thief on the Discovery Channel the other day that featured two skateboard shop owners. The hosts had scouted the shop a day before, looking for video cameras and other security equipment. The next day, they return and wait for the store owners to leave. The entrance of the store is in the back, away from the street in a secluded parking lot. A gray van meets pulls in and meets up with the host of the show. They pull out a ladder and climb in through an AC vent in the roof into the back store room. The van had a banner on the side that said it was a roofing company, in case anybody asked why they were on the roof. It took all of ten minutes to break in and get out with close to $15,000 worth of merchandise and skateboard gear. The store entrance had a "Closed Circuit TV" sticker on the door, but no video cameras. It served as a deterrence, and there was only a motion sensor near that front door.

When the police finally arrived and the store owners came to see what happened, they were devastated. Had this been an actual robbery, they'd be out of business. When the hosts and the tv show hooked them up with the "latest" in security, the store owners were so happy they could "just forget about" having to deal with it, now they had all this extra equipment. Not so fast, the hosts told them they didn't want them to forget because it was an ongoing process. Inventorying sale items, security tapes, etc would need regular attention.

This show is great, as it puts a thief's mind in perspective to securing your home or business. Both hosts were formerly professional burglars/intruders who have now "turned good" to help people. If you haven't seen the show, I recommend watching an episode.

Disable wireless on bootup

While at ShmooCon, I saw a fair share of rogue ap's pretending to be shmoocon ap's. We worked to pull down these access points, but you can never be sure. To help keep yourself from getting pwned, disable wireless upon startup by commenting out your wireless interface. This will prevent anybody from hacking your laptop (via wireless) before you even see the login screen (if you boot to desktop) and also allow you time to scan the wireless access points and decide which to connect to.

#begin /etc/network/interfaces

auto lo iface lo inet loopback

iface eth0 inet static address 172.16.2.123 netmask 255.255.255.0 gateway 172.16.2.1 network 172.16.2.0 broadcast 172.16.2.255 nameservers="172.16.4.5 172.16.4.6"

iface eth1 inet dhcp wireless-essid shmoocon

auto eth0 #auto eth1

#end /etc/network/interfaces

« Newer entries — 40 — Older entries »

blog comments powered by Disqus